You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/spec/v1.1-rc2/about.md
+3-3
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: About SLSA
3
-
description: With supply chain attacks on the rise, a shared vocabulary and universal framework is needed to provide incremental guidance to harden supply chains for more secure software production. This page introduces the main concepts behind SLSA and explains how it can help anyone involved in producing, consuming, or providing infrastructure for software.
3
+
description: With supply chain attacks on the rise, a shared vocabulary and universal framework are needed to provide incremental guidance to harden supply chains for more secure software production. This page introduces the main concepts behind SLSA and explains how it can help anyone involved in producing, consuming, or providing infrastructure for software.
4
4
---
5
5
6
6
This page is an introduction to SLSA and its concepts. If you're new
@@ -23,15 +23,15 @@ SLSA offers:
23
23
24
24
## Why SLSA is needed
25
25
26
-
Highprofile attacks like those against [SolarWinds](https://www.crowdstrike.com/blog/sunspot-malware-technical-analysis/) or [Codecov](https://about.codecov.io/apr-2021-post-mortem/) have exposed the kind of supply
26
+
High-profile attacks like those against [SolarWinds](https://www.crowdstrike.com/blog/sunspot-malware-technical-analysis/) or [Codecov](https://about.codecov.io/apr-2021-post-mortem/) have exposed the kind of supply
27
27
chain integrity weaknesses that may go unnoticed, yet quickly become very
28
28
public, disruptive, and costly in today's environment when exploited. They've
29
29
also shown that there are inherent risks not just in code itself, but at
30
30
multiple points in the complex process of getting that code into software
31
31
systems—that is, in the **software supply chain**. Since these attacks are on
32
32
the rise and show no sign of decreasing, a universal framework for hardening the
33
33
software supply chain is needed, as affirmed by the U.S. Executive Order on
34
-
Improving the Nation's Cybersecurity of May 12th 2021.
34
+
Improving the Nation's Cybersecurity of May 12th, 2021.
35
35
36
36
Security techniques for vulnerability detection and analysis of source code are
37
37
essential, but are not enough on their own. Even after fuzzing or vulnerability
0 commit comments